DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Behavioral task
behavioral1
Sample
a2fc3c6e5d21f7cf896c423c8b7152556ee6ed5c49f743633d841170677b18ff.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a2fc3c6e5d21f7cf896c423c8b7152556ee6ed5c49f743633d841170677b18ff.dll
Resource
win10v2004-20220812-en
Target
a2fc3c6e5d21f7cf896c423c8b7152556ee6ed5c49f743633d841170677b18ff
Size
89KB
MD5
35e98dd092b62d4be66a836b8015bbdf
SHA1
21d62050479f8d596ffc2c07bc4e245a562e17c5
SHA256
a2fc3c6e5d21f7cf896c423c8b7152556ee6ed5c49f743633d841170677b18ff
SHA512
416ee69046576384ed029d29db0e8759f29b34b194858acc0b08608d3fda1b7adf0980c092c2ea475651fb88049897f818b48682f650b065f75eec94f67fcaad
SSDEEP
1536:c9qSQ4pmwgvv/iNIeB8tUOLd1AH75YKpO/Y6kJji+GcxmsE70z:MTmDvTeB4USd1AH75YKA8QefE70z
resource | yara_rule |
---|---|
sample | modiloader_stage2 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ